Search the dblp DataBase
Kymie M. C. Tan :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Kymie M. C. Tan , Blair R. Collie Detection and Classification of TCP/IP Network Services. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:99-107 [Conf ] Somesh Jha , Kymie M. C. Tan , Roy A. Maxion Markov Chains, Classifiers, and Intrusion Detection. [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:206-219 [Conf ] Kevin S. Killourhy , Roy A. Maxion , Kymie M. C. Tan A Defense-Centric Taxonomy Based on Attack Manifestations. [Citation Graph (0, 0)][DBLP ] DSN, 2004, pp:102-0 [Conf ] Roy A. Maxion , Kymie M. C. Tan Benchmarking Anomaly-Based Detection Systems. [Citation Graph (0, 0)][DBLP ] DSN, 2000, pp:623-630 [Conf ] Kymie M. C. Tan , Roy A. Maxion The Effects of Algorithmic Diversity on Anomaly Detector Performance. [Citation Graph (0, 0)][DBLP ] DSN, 2005, pp:216-225 [Conf ] Kymie M. C. Tan , John McHugh , Kevin S. Killourhy Hiding Intrusions: From the Abnormal to the Normal and Beyond. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:1-17 [Conf ] Kymie M. C. Tan , Kevin S. Killourhy , Roy A. Maxion Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. [Citation Graph (0, 0)][DBLP ] RAID, 2002, pp:54-73 [Conf ] Jeffery P. Hansen , Kymie M. C. Tan , Roy A. Maxion Anomaly Detector Performance Evaluation Using a Parameterized Environment. [Citation Graph (0, 0)][DBLP ] RAID, 2006, pp:106-126 [Conf ] Kymie M. C. Tan , Roy A. Maxion "Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:188-201 [Conf ] Roy A. Maxion , Kymie M. C. Tan Anomaly Detection in Embedded Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2002, v:51, n:2, pp:108-120 [Journal ] Search in 0.092secs, Finished in 0.093secs